Analysis
-
max time kernel
107s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2022 00:12
Static task
static1
Behavioral task
behavioral1
Sample
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe
Resource
win7-20220901-en
General
-
Target
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe
-
Size
72KB
-
MD5
1b870218cf2d6a0d33a7f52dbf5bcce1
-
SHA1
b3767e9b9f5f8c6911adf0d390cd567f0ad4efb4
-
SHA256
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed
-
SHA512
d0b43096efbac642b90ef6ce6db0ed417d6bb39d91049935317cdf0b07823fb812bea41d4fc89b654e985df00adf0d412e6a4cdaccebbe0ac83726721054f084
-
SSDEEP
1536:mD7BoolMEe71MOUOY0n0hQoTM4xxRkq+dBO:mD+eMdBT7Yw0hQs3V+fO
Malware Config
Signatures
-
Possible privilege escalation attempt 34 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exepid process 960 takeown.exe 4548 icacls.exe 2256 icacls.exe 3868 icacls.exe 4408 takeown.exe 2608 takeown.exe 1508 takeown.exe 4576 icacls.exe 3488 takeown.exe 4892 takeown.exe 4836 icacls.exe 3096 takeown.exe 2520 takeown.exe 860 takeown.exe 2156 icacls.exe 344 icacls.exe 1824 icacls.exe 2760 takeown.exe 2956 takeown.exe 3720 icacls.exe 808 icacls.exe 3512 takeown.exe 676 icacls.exe 1264 icacls.exe 2296 takeown.exe 4656 icacls.exe 4440 takeown.exe 1468 takeown.exe 1248 icacls.exe 3508 takeown.exe 3584 icacls.exe 1724 takeown.exe 1080 icacls.exe 4556 icacls.exe -
Modifies file permissions 1 TTPs 34 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exepid process 1824 icacls.exe 1080 icacls.exe 1248 icacls.exe 3512 takeown.exe 3096 takeown.exe 2760 takeown.exe 2608 takeown.exe 2296 takeown.exe 808 icacls.exe 344 icacls.exe 4440 takeown.exe 3488 takeown.exe 676 icacls.exe 1264 icacls.exe 4556 icacls.exe 4656 icacls.exe 2956 takeown.exe 2256 icacls.exe 1508 takeown.exe 4836 icacls.exe 3584 icacls.exe 4576 icacls.exe 860 takeown.exe 4892 takeown.exe 2156 icacls.exe 4408 takeown.exe 960 takeown.exe 3508 takeown.exe 3868 icacls.exe 2520 takeown.exe 4548 icacls.exe 1724 takeown.exe 1468 takeown.exe 3720 icacls.exe -
Drops file in System32 directory 6 IoCs
Processes:
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exedescription ioc process File created C:\Windows\SysWOW64\ctnt.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe File opened for modification C:\Windows\SysWOW64\ctnt.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe File opened for modification C:\Windows\SysWOW64\cmd.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe File opened for modification C:\Windows\SysWOW64\ftp.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe File opened for modification C:\Windows\SysWOW64\wscript.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe File opened for modification C:\Windows\SysWOW64\cscript.exe 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 2956 takeown.exe Token: SeTakeOwnershipPrivilege 2760 takeown.exe Token: SeTakeOwnershipPrivilege 1508 takeown.exe Token: SeTakeOwnershipPrivilege 1724 takeown.exe Token: SeTakeOwnershipPrivilege 4440 takeown.exe Token: SeTakeOwnershipPrivilege 3488 takeown.exe Token: SeTakeOwnershipPrivilege 2608 takeown.exe Token: SeTakeOwnershipPrivilege 2296 takeown.exe Token: SeTakeOwnershipPrivilege 3508 takeown.exe Token: SeTakeOwnershipPrivilege 1468 takeown.exe Token: SeTakeOwnershipPrivilege 4408 takeown.exe Token: SeTakeOwnershipPrivilege 2520 takeown.exe Token: SeTakeOwnershipPrivilege 860 takeown.exe Token: SeTakeOwnershipPrivilege 4892 takeown.exe Token: SeTakeOwnershipPrivilege 3512 takeown.exe Token: SeTakeOwnershipPrivilege 960 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exepid process 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exedescription pid process target process PID 4472 wrote to memory of 3096 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3096 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3096 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 344 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 344 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 344 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2956 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2956 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2956 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1824 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1824 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1824 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2760 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2760 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2760 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2256 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2256 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2256 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 4576 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 4576 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 4576 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1724 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1724 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1724 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1080 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1080 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1080 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 4440 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 4440 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 4440 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 676 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 676 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 676 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 3488 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3488 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3488 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1264 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1264 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1264 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2608 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2608 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2608 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2156 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2156 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2156 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 2296 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2296 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 2296 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 4556 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 4556 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 4556 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 3508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3508 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3868 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 3868 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 3868 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe PID 4472 wrote to memory of 1468 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1468 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 1468 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe takeown.exe PID 4472 wrote to memory of 3720 4472 2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe"C:\Users\Admin\AppData\Local\Temp\2b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\ctnt.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\ctnt.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\ctnt.exeFilesize
72KB
MD51b870218cf2d6a0d33a7f52dbf5bcce1
SHA1b3767e9b9f5f8c6911adf0d390cd567f0ad4efb4
SHA2562b6200b7809e8ee17d4294be04c6312d3ab8b542c639db8e6d88d7f9e2c536ed
SHA512d0b43096efbac642b90ef6ce6db0ed417d6bb39d91049935317cdf0b07823fb812bea41d4fc89b654e985df00adf0d412e6a4cdaccebbe0ac83726721054f084
-
memory/344-136-0x0000000000000000-mapping.dmp
-
memory/676-146-0x0000000000000000-mapping.dmp
-
memory/808-162-0x0000000000000000-mapping.dmp
-
memory/860-161-0x0000000000000000-mapping.dmp
-
memory/960-167-0x0000000000000000-mapping.dmp
-
memory/1080-144-0x0000000000000000-mapping.dmp
-
memory/1248-158-0x0000000000000000-mapping.dmp
-
memory/1264-148-0x0000000000000000-mapping.dmp
-
memory/1468-155-0x0000000000000000-mapping.dmp
-
memory/1508-141-0x0000000000000000-mapping.dmp
-
memory/1724-143-0x0000000000000000-mapping.dmp
-
memory/1824-138-0x0000000000000000-mapping.dmp
-
memory/2156-150-0x0000000000000000-mapping.dmp
-
memory/2256-140-0x0000000000000000-mapping.dmp
-
memory/2296-151-0x0000000000000000-mapping.dmp
-
memory/2520-159-0x0000000000000000-mapping.dmp
-
memory/2608-149-0x0000000000000000-mapping.dmp
-
memory/2760-139-0x0000000000000000-mapping.dmp
-
memory/2956-137-0x0000000000000000-mapping.dmp
-
memory/3096-134-0x0000000000000000-mapping.dmp
-
memory/3488-147-0x0000000000000000-mapping.dmp
-
memory/3508-153-0x0000000000000000-mapping.dmp
-
memory/3512-165-0x0000000000000000-mapping.dmp
-
memory/3584-166-0x0000000000000000-mapping.dmp
-
memory/3720-156-0x0000000000000000-mapping.dmp
-
memory/3868-154-0x0000000000000000-mapping.dmp
-
memory/4408-157-0x0000000000000000-mapping.dmp
-
memory/4440-145-0x0000000000000000-mapping.dmp
-
memory/4548-168-0x0000000000000000-mapping.dmp
-
memory/4556-152-0x0000000000000000-mapping.dmp
-
memory/4576-142-0x0000000000000000-mapping.dmp
-
memory/4656-160-0x0000000000000000-mapping.dmp
-
memory/4836-164-0x0000000000000000-mapping.dmp
-
memory/4892-163-0x0000000000000000-mapping.dmp